-
The invention is related to methods and systems for processing an encoded signal received from a noisy channel, in particular before the decoding of the encoded signal.
Background of the invention
-
Sensor networks and ad hoc networks are wireless communication networks capable of organizing themselves without previously defined infrastructures. These networks are experiencing developments in many areas, from home applications to military applications. The implementation of these networks particularly in the case where they have a large number of communicating entities, such as several sensor nodes in the case of sensor networks, raises new issues such as the appearance of disturbances in transmission, notably interferences, presenting the peculiarity of being of impulsive nature in sufficiently dense networks.
-
To mitigate the disturbances of the system, it is necessary to code the information transmitted in a robust manner. It is known to code the information according to an error correction code which adds a redundancy.
-
Modern codes such as turbo codes or Low Density Parity Check (LDPC) codes can be used, with iterative decoding algorithms, trying to improve the quality of information being decoded iteration after iteration. The decoding of these codes uses as input the signal exiting from the channel, which may be in the form of log likelihood ratio (LLR).
-
The calculation of the LLR is based on channel modeling and depends largely on the distribution of the additive noise and interference. To do so, it is known to use a Gaussian model, which quickly reaches its limits and poorly matches the multiple communications in a network, i.e. the multiple access interferences generated by the nodes of a sufficiently dense network, which have an impulsive character and strongly influence the quality of the reception of information at the destination nodes. These interferences do not present Gaussian distributions but can be modeled by stable distributions which are characterized by a slower decay of the tails than in the Gaussian case, as described in the article of
Hassen Benmaad et al. "Clipping demapper for LDPC decoding in impulsive channel", IEEE Communications Letters, Institute of Electrical and Electronics Engineers, 2013, 17 (5), pp.968-971.
-
The use of known iterative-based decoding methods is not efficient anymore to transmit information in an impulsive environment and a significant degradation of the performances of these methods appears and affects the reliability of the decoding of the information. The mismatch between the assumption made to design the receiver and the true interference distribution makes the decoding inefficient.
-
However, the main difficulty of changing the metric lies in the fact that the distribution of the interference is not necessarily a priori known. It depends on the network configuration, for instance the density of users and the design of the layers of Media Access Control (MAC). If stable distribution is quite a general model, there is not however an explicit form of the density, making the LLR extremely complex to compute.
-
The article of Poulliat C. et al, "Performances des codes LDPCpour l'Ultra-Large Bande (ULB) impulsionnelle sous approximation gaussienne généralisée des interférences », in the proceedings of GRETSI conference, 2007, shows the use of a generalized Gaussian approximation of multi-users interferences. The type of considered impulsivity is quite specific and renders the approximation more restrictive.
-
The article of
Chuan Hsian, "Iterative SOVA decoding over alpha stable channels", Journal of Engineering Science and Technology, June 2012, vol. 7(3) describes the use of a Cauchy-Bayesan metric. The article of
Chuan Hisian, « SOVA decoding in Symmetric Alpha-Stable Noise », Symposium on Information & Computer Sciences, 2011, describes the use of Cauchy function in the path-metric. The Cauchy density is a special case of stable distribution but assumes a high impulsivity and is not adapted to low levels of impulsivity.
-
The article of M. Johnston et al., «Sum-Product Algorithm Utilizing Soft Distances on Additive impulsive Noise Channels », in IEEE Transactions on Communications, vol. 61, no. 6, pp. 2113-2116, June 2013., describes an adapted Sum-Product Algorithm (SPA) increasing the performances with respect to already-known SPA. It modifies the decoding algorithm in a deep manner, which implies a great complexity.
-
The known p-norm is an advantageously chosen solution because it only requires a rough estimate of the stable distribution, and not the estimation of the noise parameters
-
Summary
-
There thus remains a need to further increase decoding performances in the case of transmission over a noisy wireless channel. More specifically, there is a need to reduce the impact that high intensity and low duration noises, also called impulsive noise, can have on the decoding process. Reduction of such an impact can improve the amount of data packets successfully decoded by a receiver, or, equivalently, reducing the packet error rate.
-
The invention aims at satisfying this need by providing a method for processing an encoded signal S received from a noisy channel, in particular with impulsive noise in wireless transmission, prior to the decoding of the signal by a decoder, the method comprising:
- applying to the encoded signal S a first function fa,b based on at least two parameters a, b, depending on the channel noise, for obtaining a modified signal S' to be decoded, the first function being chosen so as to mitigate the influence of the channel noise during the decoding of the modified signal S',
wherein said at least two parameters a, b, are estimated beforehand by minimizing a second function J taking as input a signal AS obtained from the encoded signal S modified by a processing function using a random binary sequence.
-
The signal processing of the invention provides a generic method that can be implemented on many different types of receivers. It does not necessitate modification in the transmitter and can simply be added to existing protocols at the receiver side. It also has the advantage of not degrading communications in case of traditional communication conditions with a simple thermal Gaussian noise. Furthermore, the method is self-adaptive and can be used in many different settings, with different noise distributions.
-
The processing method according to the invention provides better results than state-of-the-art methods, allowing obtaining much more correctly decoded packets. The improvement is particularly significant if noise has an impulsive behavior.
Synchronization
-
Transmitters and receivers used for implementing the method according to the invention are usually driven by separate hardware clocks, the carrier frequency set up at the transmitter and the receiver sides may not be exactly the same. It is thus advantageous to perform a step of synchronization, for estimating and correcting carrier shift that may be introduced, to generate the encoded signal S.
-
The synchronization included in state-of-the-art systems is capable to apply the necessary correction in the case of noiseless signals or with a low level of noise. In the case of noisy signals, especially with impulsive noise, the default correction mechanism is not precise enough. An example of a BPSK modulated signal, with the presence of carrier offset, is illustrated in Fig. 7. The signal is composed of around 40000 samples, with a carrier offset of approximately 140Hz. The presence of carrier impairment produces the identified effect in the image: the amplitude, affected by noise, is not regular, and seems almost modulated, with a sinusoidal shape for the envelop. Carrier shift effect is also visible in constellation diagrams, with the spread of the samples in a circle.
-
In order to compensate the carrier offset, a synchronization metric
may be introduced, defined as:
where
represents the corrected sampled sequence from the encoded signal S, using a Δ
f offset,
indicates the imaginary part of the complex number, whereas
abs and
mean represent absolute value and average operations respectively. Corrected sampled sequence may be obtained by shifting every sample of a Δ
f offset, in frequency, and defined as:
where
Ts represents the sampling time. For the estimation and correction operation, an iterative process is advantageously defined, performed over a range of frequencies
in order to obtain frequency offset correction.
-
The aforementioned loop may be composed of the following steps: apply a temporary offset correction Δ
f , as defined above, estimate phase shift of the constellation, using for example linear approximation, compensate estimated phase shift, and compute synchronization metric
as defined above.
-
Once all the synchronization metrics are collected, the frequency offset that allows minimizing the average dispersion over the imaginary coordinate of the complex space may be selected to be applied to the sampled signal under analysis, following the expression below:
-
By applying this kind of synchronization, it is possible to obtain corrective measures that are effective in a wider noise scenario, compared with the known solutions.
Symbols and amplitudes
-
Preferably, the encoded signal S comprises a plurality of symbols ak , the first function being applied to an amplitude x associated to each symbol. The encoded signal S can be expressed as: S(t) = Σ kakh(t - kTsymb ) + n(t), where ak are the sent symbols at rate Tsymb, h(t) is a filter comprising a shaping filter and a channel filter, and n(t) is the noisy part.
-
After the synchronization, a matched filtering may be applied in order to minimize Inter-Symbol Interference, followed by a decimation operation for extracting, from the oversampled signal, one sample per symbol. The encoded signal S may thus be sampled with a number of n samples (S 1,S 2, ......, Sn ) per symbol, n being an integer, for example n=8, the number of samples per symbol being preferably reduced to one sample per symbol during a decimation step.
-
A step of symbol synchronization may be used to detect the synchronization sequence, which depends on the used protocol and is included in the encoded signal in order to identify the beginning of the useful data, also called "payload". In state-of-art systems, a PSK Detect step is responsible for the analysis of the signal, in order to associate one of the admissible point in the constellation to each symbol of the sequence. In the case of a BPSK modulation, only two symbols are possible and a positive value will be associated to 1 when a negative value will be associated to 0. A step of symbol demapping then transforms the symbol sequence to a binary sequence, which corresponds to the output for the decoding. When a Forward Error Correction code is used, such a binary decision is not optimal, and a soft decision, that is to say based on real values, is preferable.
-
The quantized decimated values, along with some information received from the PSK detect step to correct the phase shift, may be used for extract amplitudes, as can be seen in Fig. 9.
-
The method may comprise normalizing the amplitudes of the encoded signal S before estimation of the parameters a, b, and application of the first function fa,b .
-
The amplitude normalization may be obtained through division of the amplitudes of the sampled symbols by an attenuation factor, preferably defined by
wherein
SyncR represents a received synchronization sequence and
SyncD represents a default synchronization sequence, preferably represented by default BPSK symbol +1 and -1 in the case where a BPSK modulation has been applied to the encoded signal, and |
X|being an average absolute amplitude defined by
for a sequence X of n samples
X 1,
X 2 , ...... ,
Xn. Such amplitude normalization is useful to compensate path loss attenuation, due to the propagation of the signal over the channel, in particular in case of a wireless channel.
First and second functions
-
The first function is preferably a non-linear function providing a parametrized approximation of log likelihood ratio.
-
The first function may be defined by:
wherein
x is the amplitude of the received symbol under analysis, and
a and
b are the beforehand-estimated parameters.
-
An example of the first function
fa,b is represented in
Fig. 12. As visible, all input amplitudes
x in absolute value that are below a threshold
sx are preferably processed using a linear part of the first function
fa,b , and all amplitudes
x that exceed said threshold
sx are processed using an hyperbola type part of the first function
fa,b. The threshold may be defined by
-
The second function J may be defined by a cost function J(a,b) of the first function fa,b , the parameters a, b being estimated such that (a,b) = argmin J(a,b).
-
Preferably, the cost function
J is defined
by wherein
fa,b is the first function, and
ASi are the amplitudes of the input signal
AS obtained from the encoded signal
S modified by a processing function using a random binary sequence.
-
The method may comprise normalization of the samples of the modified signal S', in particular by computing a RMS value, the normalized modified signal S' being defined by no
rmalized with
wherein m is the number of samples available after processing by the first function
fa,b .
-
The linear part of the first function fa,b , as can be seen in Fig. 12, may be determined by a slope that can introduce a non-negligible amplification effect on the output signal. This amplification may introduce amplitude values out of the admissible range of the decoding algorithm. This normalization operation on the modified signal S' is useful to resize overall amplitudes and re-establish the limits within tolerable boundaries. The normalized samples keep the original shape of the non-normalized samples but with an adapted dynamic range.
Estimation of a, b parameters
-
The goal is to estimate the values of a and b that can optimize the mutual information based on the channel condition estimated for the encoded signal S.
-
The coefficient a and b may be estimated using an information theory criterion in order to maximize the mutual information between the encoded signal and the sequence after the non-linear mapping, based on a learning sequence.
-
Preferably, the estimation of the parameters a, b is performed by a non-linear optimization algorithm, preferably a Nelder-Mead algorithm. Other algorithms may be used, for example a search on a predefined grid.
-
An initial guess of the parameters a, b may be defined before the first iteration of the minimization of the second function (J), for example by setting a = 4 and b = 6.
Input signal AS
-
The input signal AS for the estimation of the parameters a, b is called "autodidact signal". This signal corresponds to an approximated isolation of the estimated noise component introduced by the channel.
-
The input signal AS for the estimation of the parameters a, b may be generated by the following expression: ASk = 1 + n'k wherein n'k is a training sequence defined by n'k = nk · rk , with nk = yk - sign(yk ), rk being a random binary sequence distributed in {-1, 1}, and yk being the kth normalized amplitude of the encoded signal S.
System
-
The invention also provides a system for processing an encoded signal S received from a noisy channel, in particular with impulsive noise in wireless transmission, prior to the decoding of the signal by a decoder, the system comprising:
- a signal processing module adapted for applying to the encoded signal S a first function based on at least two parameters for obtaining a modified signal S', the first function being chosen so as to mitigate the influence of the channel noise during the decoding of the modified signal, and
- a parameter estimation module adapted for estimating said at least two parameters beforehand by minimization of a second function taking as input a signal AS obtained from the encoded signal S modified by a processing function using a random binary sequence.
-
The system may further comprise a module adapted for normalizing the amplitudes of the encoded signal S before estimation of the parameters a, b and application of the first function fa,b .
-
The system may comprise a module adapted for normalizing the samples of the modified signal (
S'), in particular by computing a RMS value, the normalized modified signal (
S') being defined by
Normalized with
wherein
m is the number of samples available after processing by the first function
fa,b .
-
The features defined above for the method apply to the system and vice-versa.
Computer program product
-
The invention also provides a computer program product for processing an encoded signal S received from a noisy channel, in particular with impulsive noise in wireless transmission, prior to the decoding of the signal by a decoder, the computer program product comprising a support and stored on this support instructions that can be read by a processor, these instructions being configured for:
- applying to the encoded signal S a first function based on at least two parameters for obtaining a modified signal S' to be decoded, the first function being chosen so as to mitigate the influence of the channel noise during the decoding of the modified signal S', and
- estimating beforehand said at least two parameters by minimizing a second function taking as input a signal AS obtained from the encoded signal S modified by a processing function using a random binary sequence.
-
The features defined above for the method and the system apply to the computer program product.
Brief description of the drawings
-
The invention will be better understood on reading the following detailed description of non-limiting exemplary embodiments thereof and on examining the appended drawings in which:
- Figure 1 illustrates schematically an example of hardware system components for the transmission and reception of packets over a wireless network,
- Figures 2 and 3 are respective block diagrams of the implementation steps of a USRP at the transmitter and receiver sides,
- Figure 4 illustrates an example of a receiver block diagram,
- Figure 5 shows an example of parallel processing for signal extraction,
- Figure 6 is a block diagram showing some steps for extracting amplitudes according to the invention,
- Figure 7, previously described, illustrates an example of a received baseband signal with carrier offset according to the state-of-the-art,
- Figure 8 shows the result, in time domain, of the synchronization algorithm according to the invention,
- Figure 9, previously described, shows a demodulation and amplitude extraction block diagram according to the invention,
- Figure 10 is a block diagram showing some steps of the method for processing an encoded signal according to the invention,
- Figure 11 is a block diagram showing some steps of the estimation of parameters depending on the channel noise according to the invention, and
- Figure 12, previously described, illustrates an example of a non-linear function first function according to the invention.
Detailed description
-
As illustrated in Fig.1, an example of a system used in the invention for the transmission and reception of packets over a wireless network comprises an universal software radio peripheral (USRP) and an associated driving computer (PC) at the transmitter side, and a USRP and a PC at the receiver side. The packets are transmitted over a noisy wireless channel. The invention is not limited to wireless transmissions, and can apply to non-wireless transmissions, for example in Power-Line communications or acoustic transmissions. The USRPs in use are for example NI-USRP 2952R. The invention is not limited to the use of a USRP, and a system-on-chip, a DSP or FPGA may also be used. Preferably, a single USRP equipped with two independent radio interfaces is used to send and receive the signal. In this case, synchronization between transmitter and receiver is automatically achieved due to the share of the same clock at transmitter and receiver sides.
-
The operations performed by the hardware inside the USRP can be abstracted both for transmission and for reception of signals as illustrated in Fig. 2 and Fig. 3 respectively. These operations are necessary for the conversion of the signal between baseband and passband and vice versa. In the present invention, bands centered in 915 MHz and 2.45 GHz may be used, corresponding to bands of Industrial Scientific and Medical bands (ISM). The invention is however not limited to specific carrier bands.
-
In order to transmit a signal over a communication medium, it is necessary to transpose it from the baseband, which is centered around 0Hz, to the desired passband. To do so, the USRP receives the waveform to transmit from the computer, filters and transposes, in a step of up-conversion, the spectrum of the signal. The signal is then encoded and modulated. The signal in passband is amplified prior to be directed toward the antenna to be transmitted over the wireless medium.
-
The operations to be performed at the reception are meant to revert the process performed by the transmitter. In this example, in the receiving chain of the USRP, the signal captured by the antenna is amplified using a low noise amplifier. In a step of down-conversion, the received signal is transposed back to baseband applying the same carrier frequency used by the transmitter. A filtering of the down converted signal is advantageously performed in order to retain only the frequencies of interest. The filtered signal is then sampled and transferred to the computer to be further processed.
-
The general structure of the receiver application which can be used for the implementation of the invention is represented by the block diagram of Fig. 4.
-
A step for establishing the setup of the receiver is performed once at startup, similarly to the one at the transmitter, by initializing the USRP with parameters such as carrier frequency, sampling frequency, or amplification factor. During such step, it is also possible to qualify some of the properties that are specific to the coding technique in use.
-
The next step is to acquire the baseband sampled signal produced by the USRP. In this example, the data type is an array of complex numbers containing the In-Phase and Quadrature (I/Q) components of each sample, obtained by the down-conversion, as the real and imaginary part of a complex number. The structure of the received signal can be expressed as:
where
Ts represents the sampling time.
-
Due to its structure, the USRP is continuously down-converting and sampling what is detected. Consequently, the received sampled signal may or may not contain an actual transmission. Hence, a step of extracting useful signal may be performed, in order to estimate the signal and noise level, for extracting from all received samples only those that are likely to carry out a message. This is meant to reduce the execution time avoiding to process samples containing merely noise. In order to improve efficiency in signal processing and, consequently, being able to achieve real time decoding, a parallelized signal analysis may be implemented, as depicted in Fig. 5. Each "Process signal" component of parallel processing is in charge to detect boundaries for the presence of a packet. All results are recombined to produce boundaries, and used to create set of samples to be further analyzed. The remaining have been estimated to contain just channel noise.
-
The signal may then be subjected to another sampling process, as shown in Fig. 4. This is useful to have the correct number of samples per symbol necessary for the further demodulation step. Even though the sampling frequency is often a configurable parameter at the transmitter side, there can be a difference between the requested sampling frequency and the actual sampling frequency, due to hardware limitations. Thus, resampling may be performed to eliminate possible impairments.
-
A further step of demodulation and amplitude extraction, which can be decomposed as illustrated in Fig. 6, is performed in the illustrated example. The resampled noisy signal is preferably low-pass filtered prior to continue further in the demodulation chain, to form the encoded signal S.
-
As previously described, it is advantageous to perform a step of synchronization, for estimating and correcting carrier shift that may be introduced. Fig. 8 shows the result of this synchronization step, performed on the encoded signal S, in time domain.
-
A step of BPSK demodulation with amplitude extraction, previously described, and detailed in Fig. 9, is performed in order to extract amplitude associated to every symbol of the encoded signal S. This amplitude sequence will be the input for non-linear operation performed in the invention.
-
The method for processing the encoded signal according to the invention, marked by the black arrow of Fig. 4, will be further detailed below.
-
Once the encoded signal has been processed, the transmitted message is retrieved in a step of signal decoding.
-
The validity of the decoded sequence may be verified in a step of "Message display & statistics update". In this example, the sequence is subjected to a verification of the cyclic redundancy check (CRC) code added as tail of the payload at the transmitter side. If such verification is successfully passed, the payload, the essential data that is being carried within a packet, is extracted, converted in the string format and displayed for the user. The reception statistics may be updated to keep count of the current received packet as successfully or unsuccessfully decoded.
-
An example of detailed steps for processing the encoded signal S according to the invention is shown in Fig. 10.
-
As previously described, a first step is the beforehand estimation of parameters a, b depending on the channel noise, which are necessary to properly configure the computation of the non-linear first function fa,b , followed by an operation of RMS normalization, before the obtaining of the decoded sequence by a decoding step. This step uses the second function J that is a cost function J(a,b) of the first function fa,b, the parameters a, b being estimated such that (a,b) = argmin J(a,b), by using, preferably and as shown in Fig.11, a particular type of simplex method known as Nelder-Mead algorithm. It makes use of three points, in a bidimensional space, that are relocated during the iterations of the algorithm in order to obtain the estimated optimized pair a, b.
-
Preferably, as previously described and as shown on Fig. 11, for achieving the estimation of the parameters a, b, a preliminary operation of amplitude normalization is realized.
-
Once obtained the normalized amplitudes, as previously described, the autodidact Signal AS is generated by the following expression: ASk = 1 + n' k, wherein n'k is a training sequence defined by n'k = nk · rk , with nk = yk - sign(yk), rk being a random binary sequence distributed in {-1, 1}, and yk being the kth normalized amplitude of the encoded signal S. This signal AS is used as input for the cost function J(a,b), by defining an initial guess for parameters a and b, for example a = 4 and b = 6.
-
Preferably and as previously described, to every amplitude
x of every symbols under analysis, is applied a non-linear function
as illustrated in
Fig. 12, for obtaining a modified signal S' to be decoded. In this example, all input amplitudes
x in absolute value that are below a threshold
sx are processed using a linear part of the first function
fa,b , and all amplitudes
x that exceed said threshold
sx are processed using an hyperbola type part of the first function
fa,b. The threshold may be defined by:
sx =
-
In the illustrated example, a normalization of the samples of the modified signal S' is performed, by computing a RMS value, the normalized modified signal S' being defined by no
rmalized with
wherein m is the number of samples available after processing by the first function (
fa,b ).
-
The processing of the encoded signal S according to the invention is then concluded, the produced output may be adopted to perform decoding, as above-written.
-
Decoding performance tests are now going to be presented. In the following test examples, a single USRP equipped with two independent radio interfaces is used, and received signals have been added with α-stable random noise aiming to simulate an impulsive channel noise. Such a noise depends on several parameters. α is the characteristic exponent of the probability distribution function. For an α -stable distributed noise, a lower α implies a higher impulsivity of the noise. β indicates the skewness, γ is used as a scale parameter, allowing to adjust the produced noise in amplitude, and δ is defined as a location parameter introducing a shifting offset. All test presented hereafter have been produced using β = 0 and δ = 0.
-
Tests have been performed using three different coding techniques, more precisely Low Density Parity Check (LDPC) coding, Convolutional coding and Turbo codes.
-
The results, presented in table form indicating main configuration parameters, are grouped based on the type of coding technique under evaluation. The tables represent the percentage of correctly decoded packets; that is to say which have a CRC check with positive result. Results for
pure decoding, using amplitudes without applying any further processing, for
classic LLR decoding, amplitudes processed using a standard equation for the computation of the LLR,
with
ci the expected code word and
y the channel output, used with a normal distribution with
σ = 0.8, and for the method according to the invention are presented and compared.
Table 1: LDPC coding | Pure decoding | Classic LLR decoding | Invention | Average SNR |
Alpha=1.7 | 45.98% | 91.56% | 98.57% | 1.19 dB |
Gamma=0.04 |
Size= 13 Bytes |
Alpha=1.7 | 17.79% | 81.83% | 95.06% | -1.55 dB |
Gamma=0.05 |
Size= 13 Bytes |
Alpha=1.6 | 10.62% | 77.86% | 92.72% | -2.80 dB |
Gamma=0.06 |
Size= 13 Bytes |
Alpha=1.6 | 1.2% | 56.75% | 74.04% | -4.78 dB |
Gamma=0.07 |
Size= 13 Bytes |
Table 2: Convolutional coding - short payload | Pure decoding | Classic LLR decoding | Invention | Average SNR |
Alpha=1.7 | 78% | 77.99% | 96.91% | -2.4 dB |
Gamma=0.08 |
Rate=1 /2 |
Size= 40 Bytes |
Alpha=1.7 | 54.25% | 54.26% | 89.4% | -3.86 dB |
Gamma=0.09 | | | | |
Rate=1 /2 | | | | |
Size = 40 Bytes | | | | |
Alpha=1.6 | 65.2% | 65.22% | 94.07% | -1.79 dB |
Gamma=0.05 |
Rate=1 /2 |
Size = 40 Bytes |
Table 3: Convolutional coding - medium payload | Pure decoding | Classic LLR decoding | Invention | Average SNR |
Alpha=1.6 | 8.58% | 8.42% | 92.03% | -2.15 dB |
Gamma=0.05 |
Rate=1 /2 |
Size = 400 Bytes |
Alpha=1.6 | 23.55% | 22.32% | 93.78% | 4.71 dB |
Gamma=0.05 |
Rate=1 /3 |
Size = 400 Bytes |
Table 4: Convolutional coding - long payload | Pure decoding | Classic LLR decoding | Invention | Average SNR |
Alpha=1.6 | 4.61% | 4.51% | 90.85% | -2.44 dB |
Gamma=0.05 |
Rate=1 /2 |
Size = 600 Bytes |
Alpha=1.6 | 9.88% | 9.22% | 93.23% | 4.93 dB |
Gamma=0.05 |
Rate=1 /3 |
Size = 600 Bytes |
Table 5: Turbo coding | Pure decoding | Classic LLR decoding | Invention | Average SNR |
Alpha=1.6 | 36.45% | 65.80% | 79.27% | -1.59 dB |
Gamma=0.03 |
Rate=1/2 (punct.) | | | | |
Size = 13 Bytes | | | | |
Alpha=1.6 | 24.52% | 55.18% | 76.12% | -3.31 dB |
Gamma=0.04 |
Rate=1 /3 |
Size = 13 Bytes |
Alpha=1.6 | 3.65% | 30.87% | 53.23% | -6.91dB |
Gamma=0.05 |
Rate=1 /3 |
Size = 13 Bytes |
-
From these results, it is obvious that the processing method according to the invention provides better results than state-of-the-art methods. From 13% up to 80% of additional correctly decoded packets can be obtained.
-
Performances of the automatic estimation of the channel configuration parameters according to the invention are also shown, in order to determine the improvement in terms of decoding capabilities and to validate the implemented channel estimation technique.
-
All tests have been performed using convolutional coding technique, with β = 0 and δ = 0, and the results are presented in table form, indicating main configuration parameters.
-
In this example, transmitter and receiver are played by two completely separated couples of USRP and controlling unit. In such configuration, the two systems do not share the same clock, hence the synchronization operations are important to allow a proper analysis of the processed sampled signal
S'. The tables represent the percentage of correctly decoded packets, for pure decoding, for classic LLR decoding, for a processing according to the invention but with theoretical a and b parameters mathematically calculated by
and
and for the parameters estimation method according to the invention.
Table 6: Convolutional coding - α=1.7 | Pure decoding | Classic LLR decoding | Theoretical parameters estimation | Invention | Average SNR |
Alpha=1.7 | 72.27% | 72.28% | 90.48% | 84.39% | 6.48 dB |
Gamma=0.01 |
Rate=1 /2 |
Size = 150 Bytes | | | | | |
Alpha=1.7 | 18.71% | 18.71% | 58.79% | 61.30% | -11.04 dB |
Gamma=0.03 |
Rate=1 /2 |
Size = 150 Bytes |
Alpha=1.7 | 0.91% | 0.9% | 9.68% | 13.23% | -12.41 dB |
Gamma=0.05 |
Rate=1 /2 |
Size = 150 Bytes |
Table 7: Convolutional coding - α=1.8 | Pure decoding | Classic LLR decoding | Theoretical parameters estimation | Invention | Average SNR |
Alpha=1.8 | 50.16% | 50.16% | 69.25% | 76.45% | 1.55 dB |
Gamma=0.01 |
Rate=1 /2 |
Size = 150 Bytes |
Alpha=1.8 | 53.58% | 53.58% | 83.54% | 77.45% | -4.95 dB |
Gamma=0.03 |
Rate=1 /2 |
Size = 150 Bytes |
Alpha=1.8 | 7.58% | 7.58% | 26.50% | 33.84% | -9.17 dB |
Gamma=0.05 |
Rate=1 /2 |
Size = 150 Bytes |
Table 8: Convolutional coding - α=1.9 | Pure decoding | Classic LLR decoding | Theoretical parameters estimation | Invention | Average SNR |
Alpha=1.9 | 94.26% | 94.26% | 97.36% | 96.55% | 12.46 dB |
Gamma=0.01 |
Rate=1 /2 |
Size = 150 Bytes |
Alpha=1.9 | 70.19% | 70.19% | 84.64% | 80.05% | -5.21 dB |
Gamma=0.03 |
Rate=1 /2 | | | | | |
Size = 150 Bytes |
Alpha=1.9 | 14.39% | 14.39% | 24.55% | 29.46% | -11.56 dB |
Gamma=0.05 |
Rate=1 /2 |
Size = 150 Bytes |
Table 9: Convolutional coding - Natural thermal noise | Pure decoding | Classic LLR decoding | Non-linear theoretical | Non-linear estimated |
Rate=1 /2 | 98.63% | 98.63% | 98.63% | 98.63% |
Size = 150 Bytes |
-
From these results, it is obvious that the estimated parameters according to the invention do not degrade the decoding performances, and even improve these performances most of the time.